Search Results - ((detection algorithm) OR (((section algorithm) OR (optimization algorithm))))
Search alternatives:
-
1
Solving time gap problems through the optimization of detecting stepping stone algorithm
Published 2004“…It is found that current algorithm of detecting stepping stone is not optimized. …”
Get full text
Get full text
Book Section -
2
Early diabetes risk prediction using Ant Colony Optimization algorithm / Nur Aisyatul Husna Ahmad Yusri and Rizauddin Saian
Published 2023“…Therefore, this study has developed a classification model for predicting early diabetes risk using an Ant Colony Optimization (ACO) algorithm. The ACO-based classification algorithm, Ant-Miner is used to train the diabetes dataset of 520 new diabetes or potential diabetes patients from Sylhet Diabetes Hospital in Sylhet, Bangladesh. …”
Get full text
Get full text
Book Section -
3
Adaptive DNA computing algorithm by using PCR and restriction enzyme
Published 2004“…By doing this, the molecules which serve as a solution candidate can he narrowcd down and the optimal solution can be detected easily. From the application point of view, a simulation has been carried out on the shortest puth problem and the validity of the proposed adaptive algorithm is stated from the results of the simulation. …”
Get full text
Get full text
Book Section -
4
Facial emotion detection using Guided Particle Swarm Optimization (GPSO)
Published 2009Get full text
Working Paper -
5
-
6
Fault Detection Relevant, Neural Network and Evolutionary Algorithm based Model for a Single-shaft Industrial Gas Turbine
Published 2009“…In this paper the result of an attempt to develop a substitute nonlinear model based on multilayer neural network (MLNN) and evolutionary algorithm (EA) for a single-shaft gas turbine having IGVs and VSVs is presented. …”
Get full text
Conference or Workshop Item -
7
-
8
Salivary based sers analysis in recognition of ns1 for pcasvm classification of dengue fever / Afaf Rozan Mohd Radzol
Published 2018“…The spectra are pre-processed to remove unwanted features using signal processing algorithms customized and optimized for this study. …”
Get full text
Get full text
Book Section -
9
A new hybrid technique for nosologic segmentation of primary brain tumors / Shafaf Ibrahim
Published 2015“…For this purpose, an algorithm which hybridized the Intensity Based Analysis (IBA), Grey Level Cooccurrence Matrices (GLCM), Adaptive Network-based Fuzzy Inference System (ANFIS) and Particle Swarm Optimization (PSO) Clustering Algorithm (CAPSOCA) is proposed. …”
Get full text
Get full text
Book Section -
10
Shape matching and object recognition using dissimilarity measures with Hungarian algorithm
Published 2009Get full text
Working Paper -
11
New synchronization protocol for distributed system with TCP extension
Published 2013“…These results show that the proposed algorithm, on average, has 7.97% higher fault-tolerance. …”
Get full text
Get full text
Thesis -
12
Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri
Published 2018“…Usually, most of the standard face recognition systems contain four sections: face detection, feature extraction, feature selection, and classification. …”
Get full text
Get full text
Get full text
Thesis -
13
Intrusion Detection Systems, Issues, Challenges, and Needs
Published 2021“…However, these algorithms suffer from many lacks especially when apply to detect new type of attacks, and need for new algorithms such as JAYA algorithm, teaching learning-based optimization algorithm (TLBO) algorithm is arise. …”
Get full text
Get full text
Get full text
Article -
14
Improved intrusion detection algorithm based on TLBO and GA algorithms
Published 2021“…Optimization algorithms are widely used for the identification of intrusion. …”
Get full text
Get full text
Get full text
Article -
15
Improved hybrid teaching learning based optimization-jaya and support vector machine for intrusion detection systems
Published 2022“…Most of the currently existing intrusion detection systems (IDS) use machine learning algorithms to detect network intrusion. …”
Get full text
Get full text
Thesis -
16
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
Get full text
Get full text
Thesis -
17
Cooperative source detection using an optimized distributed levy flight algorithm
Published 2023“…The DLF algorithm is optimized by means of repulsive artificial potential force to disperse the agents in order to optimize the search space coverage and detection time. …”
Get full text
Get full text
Get full text
Article -
18
Robust multi-user detection based on hybrid grey wolf optimization
Published 2020“…In this paper, a novel hybrid Grey wolf optimization and differential evolution algorithm robust multi-user detection algorithm is proposed to overcome the problem of high bit error rate (BER) in multi-user detection under impulse noise environment. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
19
Rao-SVM machine learning algorithm for intrusion detection system
Published 2020“…Most of the intrusion detection systems are developed based on optimization algorithms as a result of the increase in audit data features; optimization algorithms are also considered for IDS due to the decline in the performance of the human-based methods in terms of their training time and classification accuracy. …”
Get full text
Get full text
Get full text
Article -
20
Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan
Published 2005“…The results from both the optimized approach and existing algorithm are compared. …”
Get full text
Get full text
Thesis
